Highlights
- Pro
Lists (2)
Sort Name ascending (A-Z)
Starred repositories
A curated list of various bug bounty tools
Automatically exported from code.google.com/p/ghost-phisher
Hijack services that relies on QR Code Authentication.
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary…
PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
proxyearth data leak website theme source code
WormGPT is a malicious AI tool promoted on the dark web as the adversary of ChatGPT. It automates the creation of convincing personalized fake emails, aiding in criminal activities like phishing an…
Caido plugin for Postman integration - Search public collections, import API requests, replay through Caido, extract headers/body from APIs
Data Engineering Zoomcamp is a free 9-week course on building production-ready data pipelines. The next cohort starts in January 2026. Join the course here 👇🏼
An agentic Android automation system that extracts and structures financial transactions from UPI apps using DroidRun.
CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.
FastAPI framework, high performance, easy to learn, fast to code, ready for production
The easy-to-use open source Business Intelligence and Embedded Analytics tool that lets everyone work with data 📊
A boilerplate for Node.js web applications
Master programming by recreating your favorite technologies from scratch.
Bootstrap Kubernetes the hard way. No scripts.